How it works? A ransomware attack will go through five stages from the time it is installed on your computer, until you see the warning on your computer screen. Step One: INSTALLATION – After a victim’s computer is infected, the ransomware will installs itself, and sets keys in the Windows Registry to start automatically every time your computer boots up or restarts. Step Two: CONTACTING HEADQUARTERS – Before ransomware can affect you, it contacts a...
Don’t forget, we’re back today @ 2pm ET! www.d7xtech.com/live Today we’re going to have yesterday’s planned special guest who couldn’t make it — perhaps — and I’ll discuss the ideas I’ve been brewing (a direct result of yesterday’s content packed mini-show!) Question for the Techs out there (from show #6): Do you have any special tips or tricks at locating and recovering the specific source of a malware/virus infection (typically a trojan dropper)? So far, we know most droppers...
Here’s an interesting email I just received by Chief-01 from deviantart.com: “My friend’s company got hit by Cryptolocker and they bought the key, but their computers got moved around before they paid and not all the files got decrypted because the registry paths to the files were no longer valid. I wrote a python script to take care of the missed files for them. As long as you have the private key this program will...
http://www.youtube.com/watch?v=VchceUk2jks Tune in and check out the entire show, it’s a good one. If you’re just interested in me saying “umm” a lot then tune to the 59:00 minute mark. 🙂
CryptoPrevent v2.5 has just been released with a few changes, including a new layer of protection against malicious software. How often have you seen executable trojan droppers for malware disguised as a document? If you have any experience in the field, the answer should be FREQUENTLY. This particular tactic of malware relies on the fact that file extensions are hidden in Windows by default, so most users will see the normal icon and a filename...
v2.0 v2.0.1 of my Cryptolocker prevention utility has been released with new whitelisting capabilities and command line parameters for scripting! UDPATE: v2.0 had a bug in the whitelisting component which didn’t work on some systems, it is fixed in v2.0.1 and is tested on all platforms. https://www.d7xtech.com/cryptoprevent-malware-prevention/ New functionality: Automatically whitelist all EXEs currently located in %appdata% / %localappdata% and their first level subdirectories. Whitelist editor where you can view existing whitelisted items, and whitelist individual EXEs...
With all this mess about Cryptolocker going around, a lot of folks are looking to immunize themselves from this nasty bit of malware which will encrypt user files and hold them for ransom. Removal of the malware is easy with d7, but there is no known method to decrypt the files except by paying the ransom, so prevention is crucial. There is a Cryptolocker Prevention Kit here: http://msmvps.com/blogs/bradley/archive/2013/10/15/cryptolocker-prevention-kit.aspx however the kit is for domains and professional...